Patent classifications
H04L43/02
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
TELEMETRY REDUNDANT MEASUREMENT AVOIDANCE PROTOCOL
The present disclosure describes a telemetry redundant measurement avoidance protocol (TRMAP) that solves redundant data collection problems in telemetry systems. The TRMAP can operate in a non-supervised environment and/or in a distributed manner, and does not require a central controller to manage multiple collection agents in one or multiple telemetry systems. The TRMAP can also be an opt-in-based protocol that favors altruistic data sharing and reuse between collection agents. In these ways, the TRMAP provides freedom and collaboration among developers or other entities that desired telemetry data, while allowing non-compliant collection agents to coexist, if possible.
TELEMETRY REDUNDANT MEASUREMENT AVOIDANCE PROTOCOL
The present disclosure describes a telemetry redundant measurement avoidance protocol (TRMAP) that solves redundant data collection problems in telemetry systems. The TRMAP can operate in a non-supervised environment and/or in a distributed manner, and does not require a central controller to manage multiple collection agents in one or multiple telemetry systems. The TRMAP can also be an opt-in-based protocol that favors altruistic data sharing and reuse between collection agents. In these ways, the TRMAP provides freedom and collaboration among developers or other entities that desired telemetry data, while allowing non-compliant collection agents to coexist, if possible.
NETWORK PERFORMANCE DETECTION METHOD AND APPARATUS, AND NETWORK DEVICE
A network performance detection method and apparatus, and a related network device are disclosed. According to the network performance detection method, a first IFIT header includes reporting manner indication information indicating that reporting is performed by an egress node device. After obtaining a first IFIT detection packet including the first IFIT header, a first network device can provide and process a second IFIT detection packet, where the second IFIT detection packet is obtained by adding a first device identifier and a first data flow detection result to the first IFIT detection packet. In other words, a detection result obtained by detecting a first data flow is reported only by the egress node device, and all node devices on a transmission link of the first data flow each includes the detection result in a same IFIT detection packet and sends the same IFIT detection packet to the egress node device.
Privacy-secure edge-zone computing for secure-operation authorization
A system includes a security controller located within a central-zone in communication with a provisioned agent operating on an edge-zone device. The security controller may implement controller-blind security control on the edge-zone device by making security authorization determinations using a secure-operation confidence analysis performed by the provisioned agent. The provisioned agent, operating within the edge-zone, may have access to un-sanitized data, which may be unavailable to the security controller in the central-zone. The provisioned agent may access condition-descriptors via a secure-operation confidence assignment matrix. Using the condition-descriptors, the provisioned agent determine feedback, which may include a secure-operation confidence coefficient, based on the un-sanitized data to which the security controller is blind.
Privacy-secure edge-zone computing for secure-operation authorization
A system includes a security controller located within a central-zone in communication with a provisioned agent operating on an edge-zone device. The security controller may implement controller-blind security control on the edge-zone device by making security authorization determinations using a secure-operation confidence analysis performed by the provisioned agent. The provisioned agent, operating within the edge-zone, may have access to un-sanitized data, which may be unavailable to the security controller in the central-zone. The provisioned agent may access condition-descriptors via a secure-operation confidence assignment matrix. Using the condition-descriptors, the provisioned agent determine feedback, which may include a secure-operation confidence coefficient, based on the un-sanitized data to which the security controller is blind.
GRAPHICAL USER INTERFACE FOR PARTIAL AMOUNT REDUCTIONS
A machine may be configured to facilitate partial reductions of an amount by generating and providing a graphical user interface that enables a user to specify one or more partial reductions of the amount, thus defining or otherwise controlling how the amount is to be reduced in stages by such partial reductions. For example, in situations where a total amount is to be reduced in stages by multiple partial reductions, the generated and provided graphical user interface may be operable to specify each stage of reduction by enabling the user to select a corresponding account for each stage of reduction. The corresponding account may be selected from among a set of multiple available accounts, each with a respectively corresponding available amount, any of which may be an accumulated amount gathered from a periodic series of transactions authorized to occur periodically.
TELEMETRY DISTRIBUTION IN AN OVERLAY NETWORK
Systems including at least one processor and a memory storing instructions that, when executed by the at least one processor, result in the system collecting real-time telemetry measurements for packets received at each hop of an overlay network, and the system injecting the measurements into a variable-length trailers of the packets.
TELEMETRY DISTRIBUTION IN AN OVERLAY NETWORK
Systems including at least one processor and a memory storing instructions that, when executed by the at least one processor, result in the system collecting real-time telemetry measurements for packets received at each hop of an overlay network, and the system injecting the measurements into a variable-length trailers of the packets.